CVE-2017-14202 – The shell implementation does not protect against buffer overruns resulting in unpredictable behavior.
https://notcve.org/view.php?id=CVE-2017-14202
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in the shell component of Zephyr allows a serial or telnet connected user to cause a crash, possibly with arbitrary code execution. This issue affects: Zephyr shell versions prior to 1.14.0 on all. Una Restricción Inapropiada de Operaciones dentro de los Límites de una vulnerabilidad del Búfer de la Memoria en el componente shell de Zephyr, permite a un usuario conectado serial o telnet causar un bloqueo, posiblemente con la ejecución de código arbitrario. Este problema afecta a: shell de Zephyr versiones anteriores a 1.14.0 sobre todo. • https://docs.zephyrproject.org/1.14.0/releases/release-notes-1.14.html https://github.com/zephyrproject-rtos/zephyr/pull/13048 https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-18 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2017-14199
https://notcve.org/view.php?id=CVE-2017-14199
A buffer overflow has been found in the Zephyr Project's getaddrinfo() implementation in 1.9.0 and 1.10.0. Una vulnerabilidad de tipo buffer overflow ha sido encontrada en la implementación de getaddrinfo() de Zephyr Project, versiones 1.9.0 y 1.10.0. • https://github.com/zephyrproject-rtos/zephyr/pull/6158 https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-12 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2018-1000800
https://notcve.org/view.php?id=CVE-2018-1000800
zephyr-rtos version 1.12.0 contains a NULL base pointer reference vulnerability in sys_ring_buf_put(), sys_ring_buf_get() that can result in CPU Page Fault (error code 0x00000010). This attack appear to be exploitable via a malicious application call the vulnerable kernel APIs (system sys_ring_buf_get() and sys_ring_buf_put). zephyr-rtos 1.12.0 contiene una vulnerabilidad de desreferencia de puntero NULL en sys_ring_buf_put() y sys_ring_buf_get() que puede resultar en un fallo de página de CPU (código de error 0x00000010). El ataque parece ser explotable si una aplicación maliciosa llama a las API (sys_ring_buf_get() y sys_ring_buf_put del sistema) del kernel vulnerable. • https://github.com/zephyrproject-rtos/zephyr/issues/7638 • CWE-476: NULL Pointer Dereference •